Description
Heap-based buffer overflow in the GetWavHeader function in generic/jkSoundFile.c in the Snack Sound Toolkit, as used in WaveSurfer 1.8.8p4, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a large chunk size in a WAV file.
Exploits (1)
exploitdb
WORKING POC
VERIFIED
by Jean Pascal Pereira · pythondoswindows
https://www.exploit-db.com/exploits/19772
References (6)
Core 6
Core References
Vendor Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/49889
Exploit, VDB Entry exploit
x_refsource_exploit-db
http://www.exploit-db.com/exploits/19772
Third Party Advisory vendor-advisory
x_refsource_gentoo
http://security.gentoo.org/glsa/glsa-201309-04.xml
Mailing List, Third Party Advisory mailing-list
x_refsource_mlist
http://www.openwall.com/lists/oss-security/2012/12/10/2
Third Party Advisory vendor-advisory
x_refsource_suse
http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00034.html
Broken Link vendor-advisory
x_refsource_mandriva
http://www.mandriva.com/security/advisories?name=MDVSA-2013:126
Scores
EPSS
0.2261
EPSS Percentile
95.9%
Details
CWE
CWE-119
Status
published
Products (4)
kth/snack_sound_toolkit
2.2.10
kth/wavesurfer
1.8.8 p4
opensuse/opensuse
13.1
opensuse/opensuse
13.2
Published
Oct 28, 2013
Tracked Since
Feb 18, 2026